Paradox Community

Items in pnews.paradox-programming

Subject:Re: Library Hex Editing Experiment
Date:Fri, 10 Mar 2023 14:02:06 -0800
From:Peter <peterspammenot@whiteknight.email>
Newsgroups:pnews.paradox-programming
That's disappointing. The next step would be to pursure encrypting the 
employee names and other figures.

Given Tom Krieg's suggestion of keeping in mind my target audience, I'm 
leaning towards a "that's good enough".

I am still intrigued however. I created another library. This time I am 
wondering if any information can be had without me providing any details 
of what to look for. Any takers?




On 03/10/2023 10:14 a.m., Michael Kennedy wrote:
> Peter,
> 
> On 10/03/2023 02:28, Peter wrote:
> 
>> dynInt["Jack"] = 99
>> dynInt["Jill"] = 5
>> dynInt["Sam"] = 105
>>
>> The names can be seen but can the smallint value be seen?
> 
> Yes.
> 
> In hex, those values are 63, 05, and 69. They're in both files, a few 
> bytes just before the three names.
> 
> 
>> dynName[99] = "Jack"
>> dynName[5] = "Jill"
>> dynName[105] = "Sam"
>>
>> Again, the names can be seen but can the elements be seen?
> 
> Yes - as above.
> 
> If, for example, your data had the salaries of three folks (one being 
> myself, Jill), and I knew my salary was 12345 (that's 39 30 in hex, 
> reverse order), I could then easily extract the salaries of the other 
> two entries.
> 
> Probably OK if the data is not super-sensitive.
> 
> If the data is very sensitive, such as passwords, then maybe all file 
> copies should be encrypted. And, if any data is S-U-P-E-R sensitive, 
> then all memory copies should probably remain encrypted, except for the 
> moments the actual decrypted values are used.
> 
>    - Michael

secrets.ldl


Copyright © 2004 thedbcommunity.com